BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

PraisonAI flaw exploited in under four hours

PraisonAI flaw exploited within four hours of public disclosure

  • Attackers targeted the PraisonAI vulnerability within 3 hours and 44 minutes of its public disclosure on May 11, 2026.
  • The flaw, CVE-2026-44338, is a missing authentication bug that allows unauthenticated access to sensitive API endpoints and workflow triggers.
  • The vulnerability affects versions 2.5.6 through 4.6.33, with a patch available in version 4.6.34.

Threat actors rapidly began exploiting a critical security flaw in the open-source PraisonAI framework, with the first attack attempts occurring less than four hours after public disclosure in May 2026. The vulnerability exposes unsecured API endpoints, allowing unauthorized access to core system functions.

- Advertisement -

Identified as CVE-2026-44338, this flaw stems from a legacy Flask API server shipping with authentication disabled by default. According to an advisory, this lets any caller access the `/agents` endpoint and trigger workflows via `/chat` without a token.

Consequently, attackers can enumerate agent configurations, consume API quotas, and expose the results of AI runs. The impact, however, ultimately depends on what the operator’s configured workflow is permitted to do.

Sysdig reported that a scanner probing for the flaw originated from IP address 146.190.133[.]49. This activity followed a profile of two scanning passes targeting generic paths and then specific AI-agent surfaces.

The probe confirming the bypass was a single GET request to `/agents` with the User-Agent “CVE-Detector/1.0.” “That request returns 200 OK… confirming the bypass was successful,” Sysdig said.

- Advertisement -

Meanwhile, the maintainers of PraisonAI have patched the issue in version 4.6.34. Security researcher Shmulik Cohen is credited with discovering the vulnerability.

This incident exemplifies a growing trend where exploits are weaponized almost immediately after disclosure. Consequently, organizations must patch urgently and audit deployments for suspicious activity.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Oobit Expands Crypto Payments Into Colombia, Its 9th Market

Oobit, a Tether-backed payments firm, has expanded to Colombia, its ninth market across Latin...

Trump-Xi Talks Stir Global Markets, Including Cryptocurrency

A potential trade deal between the US and China could boost investor confidence and...

Bitcoin Dips Near $79K Amid $630M ETF Outflows

Bitcoin dipped below $80,000, hitting a low near $78,795, as U.S. spot ETFs saw...

Nvidia’s Huang Optimistic for U.S.-China Ties

NVIDIA CEO Jensen Huang expressed optimism for improved U.S.-China ties ahead of the Trump-Xi...

BitGo Q1 Loss Widens Despite Revenue Jump, Client Growth

BitGo reported a Q1 2026 net loss of $60.7 million, widened by $53.7 million...

Must Read

7 Best Audiobooks on Cybersecurity

Cybersecurity has become an essential topic in our increasingly digital world. As technology evolves and becomes more integrated into our daily lives, the importance...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading